{"id":"USN-5505-1","summary":"linux-lts-xenial, linux-kvm vulnerabilities","details":"Norbert Slusarek discovered a race condition in the CAN BCM networking\nprotocol of the Linux kernel leading to multiple use-after-free\nvulnerabilities. A local attacker could use this issue to execute arbitrary\ncode. (CVE-2021-3609)\n\nLikang Luo discovered that a race condition existed in the Bluetooth\nsubsystem of the Linux kernel, leading to a use-after-free vulnerability. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2021-3752)\n\nIt was discovered that the NFC subsystem in the Linux kernel contained a\nuse-after-free vulnerability in its NFC Controller Interface (NCI)\nimplementation. A local attacker could possibly use this to cause a denial\nof service (system crash) or execute arbitrary code. (CVE-2021-3760)\n\nSzymon Heidrich discovered that the USB Gadget subsystem in the Linux\nkernel did not properly restrict the size of control requests for certain\ngadget types, leading to possible out of bounds reads or writes. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2021-39685)\n\nIt was discovered that the Ion Memory Manager subsystem in the Linux kernel\ncontained a use-after-free vulnerability. A local attacker could possibly\nuse this to cause a denial of service (system crash) or execute arbitrary\ncode. (CVE-2021-39714)\n\nEric Biederman discovered that the cgroup process migration implementation\nin the Linux kernel did not perform permission checks correctly in some\nsituations. A local attacker could possibly use this to gain administrative\nprivileges. (CVE-2021-4197)\n\nLin Ma discovered that the NFC Controller Interface (NCI) implementation in\nthe Linux kernel contained a race condition, leading to a use-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2021-4202)\n\nSushma Venkatesh Reddy discovered that the Intel i915 graphics driver in\nthe Linux kernel did not perform a GPU TLB flush in some situations. A\nlocal attacker could use this to cause a denial of service or possibly\nexecute arbitrary code. (CVE-2022-0330)\n\nIt was discovered that the PF_KEYv2 implementation in the Linux kernel did\nnot properly initialize kernel memory in some situations. A local attacker\ncould use this to expose sensitive information (kernel memory).\n(CVE-2022-1353)\n\nIt was discovered that the virtual graphics memory manager implementation\nin the Linux kernel was subject to a race condition, potentially leading to\nan information leak. (CVE-2022-1419)\n\nMinh Yuan discovered that the floppy disk driver in the Linux kernel\ncontained a race condition, leading to a use-after-free vulnerability. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2022-1652)\n\nIt was discovered that the Atheros ath9k wireless device driver in the\nLinux kernel did not properly handle some error conditions, leading to a\nuse-after-free vulnerability. A local attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2022-1679)\n\nIt was discovered that the Marvell NFC device driver implementation in the\nLinux kernel did not properly perform memory cleanup operations in some\nsituations, leading to a use-after-free vulnerability. A local attacker\ncould possibly use this to cause a denial of service (system crash) or\nexecute arbitrary code. (CVE-2022-1734)\n\nIt was discovered that some Intel processors did not completely perform\ncleanup actions on multi-core shared buffers. A local attacker could\npossibly use this to expose sensitive information. (CVE-2022-21123)\n\nIt was discovered that some Intel processors did not completely perform\ncleanup actions on microarchitectural fill buffers. A local attacker could\npossibly use this to expose sensitive information. (CVE-2022-21125)\n\nIt was discovered that some Intel processors did not properly perform\ncleanup during specific special register write operations. A local attacker\ncould possibly use this to expose sensitive information. (CVE-2022-21166)\n\nIt was discovered that the USB Gadget file system interface in the Linux\nkernel contained a use-after-free vulnerability. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2022-24958)\n\n赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not\nproperly perform reference counting in some error conditions. A local\nattacker could use this to cause a denial of service. (CVE-2022-28356)\n\nIt was discovered that the 8 Devices USB2CAN interface implementation in\nthe Linux kernel did not properly handle certain error conditions, leading\nto a double-free. A local attacker could possibly use this to cause a\ndenial of service (system crash). (CVE-2022-28388)\n","modified":"2026-02-10T04:42:41Z","published":"2022-07-07T07:59:25Z","related":["UBUNTU-CVE-2021-3609","UBUNTU-CVE-2021-3752","UBUNTU-CVE-2021-3760","UBUNTU-CVE-2021-39685","UBUNTU-CVE-2021-39714","UBUNTU-CVE-2021-4197","UBUNTU-CVE-2021-4202","UBUNTU-CVE-2022-0330","UBUNTU-CVE-2022-1353","UBUNTU-CVE-2022-1419","UBUNTU-CVE-2022-1652","UBUNTU-CVE-2022-1679","UBUNTU-CVE-2022-1734","UBUNTU-CVE-2022-21123","UBUNTU-CVE-2022-21125","UBUNTU-CVE-2022-21166","UBUNTU-CVE-2022-24958","UBUNTU-CVE-2022-28356","UBUNTU-CVE-2022-28388"],"upstream":["CVE-2021-3609","CVE-2021-3752","CVE-2021-3760","CVE-2021-39685","CVE-2021-39714","CVE-2021-4197","CVE-2021-4202","CVE-2022-0330","CVE-2022-1353","CVE-2022-1419","CVE-2022-1652","CVE-2022-1679","CVE-2022-1734","CVE-2022-21123","CVE-2022-21125","CVE-2022-21166","CVE-2022-24958","CVE-2022-28356","CVE-2022-28388","UBUNTU-CVE-2021-3609","UBUNTU-CVE-2021-3752","UBUNTU-CVE-2021-3760","UBUNTU-CVE-2021-39685","UBUNTU-CVE-2021-39714","UBUNTU-CVE-2021-4197","UBUNTU-CVE-2021-4202","UBUNTU-CVE-2022-0330","UBUNTU-CVE-2022-1353","UBUNTU-CVE-2022-1419","UBUNTU-CVE-2022-1652","UBUNTU-CVE-2022-1679","UBUNTU-CVE-2022-1734","UBUNTU-CVE-2022-21123","UBUNTU-CVE-2022-21125","UBUNTU-CVE-2022-21166","UBUNTU-CVE-2022-24958","UBUNTU-CVE-2022-28356","UBUNTU-CVE-2022-28388"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5505-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3609"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3752"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3760"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4197"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4202"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-39685"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-39714"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0330"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1353"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1419"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1652"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1679"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1734"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21123"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21125"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21166"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-24958"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28356"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28388"}],"affected":[{"package":{"name":"linux-lts-xenial","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-lts-xenial@4.4.0-229.263~14.04.1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-229.263~14.04.1"}]}],"versions":["4.4.0-13.29~14.04.1","4.4.0-14.30~14.04.2","4.4.0-15.31~14.04.1","4.4.0-18.34~14.04.1","4.4.0-21.37~14.04.1","4.4.0-22.39~14.04.1","4.4.0-22.40~14.04.1","4.4.0-24.43~14.04.1","4.4.0-28.47~14.04.1","4.4.0-31.50~14.04.1","4.4.0-34.53~14.04.1","4.4.0-36.55~14.04.1","4.4.0-38.57~14.04.1","4.4.0-42.62~14.04.1","4.4.0-45.66~14.04.1","4.4.0-47.68~14.04.1","4.4.0-51.72~14.04.1","4.4.0-53.74~14.04.1","4.4.0-57.78~14.04.1","4.4.0-59.80~14.04.1","4.4.0-62.83~14.04.1","4.4.0-63.84~14.04.2","4.4.0-64.85~14.04.1","4.4.0-66.87~14.04.1","4.4.0-67.88~14.04.1","4.4.0-70.91~14.04.1","4.4.0-71.92~14.04.1","4.4.0-72.93~14.04.1","4.4.0-75.96~14.04.1","4.4.0-78.99~14.04.2","4.4.0-79.100~14.04.1","4.4.0-81.104~14.04.1","4.4.0-83.106~14.04.1","4.4.0-87.110~14.04.1","4.4.0-89.112~14.04.1","4.4.0-91.114~14.04.1","4.4.0-92.115~14.04.1","4.4.0-93.116~14.04.1","4.4.0-96.119~14.04.1","4.4.0-97.120~14.04.1","4.4.0-98.121~14.04.1","4.4.0-101.124~14.04.1","4.4.0-103.126~14.04.1","4.4.0-104.127~14.04.1","4.4.0-108.131~14.04.1","4.4.0-109.132~14.04.1","4.4.0-111.134~14.04.1","4.4.0-112.135~14.04.1","4.4.0-116.140~14.04.1","4.4.0-119.143~14.04.1","4.4.0-121.145~14.04.1","4.4.0-124.148~14.04.1","4.4.0-127.153~14.04.1","4.4.0-128.154~14.04.1","4.4.0-130.156~14.04.1","4.4.0-131.157~14.04.1","4.4.0-133.159~14.04.1","4.4.0-134.160~14.04.1","4.4.0-135.161~14.04.1","4.4.0-137.163~14.04.1","4.4.0-138.164~14.04.1","4.4.0-139.165~14.04.1","4.4.0-140.166~14.04.1","4.4.0-141.167~14.04.1","4.4.0-142.168~14.04.1","4.4.0-143.169~14.04.2","4.4.0-144.170~14.04.1","4.4.0-146.172~14.04.1","4.4.0-148.174~14.04.1","4.4.0-150.176~14.04.1","4.4.0-151.178~14.04.1","4.4.0-154.181~14.04.1","4.4.0-157.185~14.04.1","4.4.0-159.187~14.04.1","4.4.0-161.189~14.04.1","4.4.0-164.192~14.04.1","4.4.0-165.193~14.04.1","4.4.0-166.195~14.04.1","4.4.0-168.197~14.04.1","4.4.0-169.198~14.04.1","4.4.0-170.199~14.04.1","4.4.0-171.200~14.04.1","4.4.0-173.203~14.04.1","4.4.0-174.204~14.04.1","4.4.0-176.206~14.04.1","4.4.0-177.207~14.04.1","4.4.0-178.208~14.04.1","4.4.0-179.209~14.04.1","4.4.0-184.214~14.04.1","4.4.0-185.215~14.04.1","4.4.0-186.216~14.04.1","4.4.0-187.217~14.04.1","4.4.0-189.219~14.04.1","4.4.0-190.220~14.04.1","4.4.0-193.224~14.04.1","4.4.0-194.226~14.04.1","4.4.0-197.229~14.04.1","4.4.0-198.230~14.04.1","4.4.0-200.232~14.04.1","4.4.0-201.233~14.04.1","4.4.0-203.235~14.04.1","4.4.0-204.236~14.04.1","4.4.0-206.238~14.04.1","4.4.0-208.240~14.04.1","4.4.0-209.241~14.04.1","4.4.0-210.242~14.04.1","4.4.0-211.243~14.04.1","4.4.0-212.244~14.04.1","4.4.0-213.245~14.04.1","4.4.0-214.246~14.04.1","4.4.0-215.247~14.04.1","4.4.0-218.251~14.04.1","4.4.0-219.252~14.04.1","4.4.0-221.254~14.04.1","4.4.0-222.255~14.04.1","4.4.0-223.256~14.04.1","4.4.0-224.257~14.04.1","4.4.0-227.261~14.04.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"block-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"crypto-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"fat-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"fb-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"firewire-core-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"floppy-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"fs-core-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"fs-secondary-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"input-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"ipmi-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"irda-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"kernel-image-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-buildinfo-4.4.0-229-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-buildinfo-4.4.0-229-lowlatency","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-cloud-tools-4.4.0-229-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-cloud-tools-4.4.0-229-lowlatency","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-headers-4.4.0-229","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-headers-4.4.0-229-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-headers-4.4.0-229-lowlatency","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-image-4.4.0-229-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-image-unsigned-4.4.0-229-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-image-unsigned-4.4.0-229-lowlatency","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-lts-xenial-cloud-tools-4.4.0-229","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-lts-xenial-tools-4.4.0-229","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-lts-xenial-udebs-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-modules-4.4.0-229-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-modules-4.4.0-229-lowlatency","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-modules-extra-4.4.0-229-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-tools-4.4.0-229-generic","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"linux-tools-4.4.0-229-lowlatency","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"md-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"message-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"mouse-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"multipath-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"nfs-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"nic-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"nic-pcmcia-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"nic-shared-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"nic-usb-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"parport-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"pata-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"pcmcia-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"pcmcia-storage-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"plip-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"ppp-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"sata-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"scsi-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"serial-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"speakup-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"storage-core-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"usb-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"virtio-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"},{"binary_name":"vlan-modules-4.4.0-229-generic-di","binary_version":"4.4.0-229.263~14.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5505-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3609"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3752"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3760"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-4197"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-4202"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-39685"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-39714"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-0330"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1353"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1419"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1652"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1679"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1734"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21123"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21125"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21166"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-24958"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-28356"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-28388"}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"linux-kvm","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-kvm@4.4.0-1110.120?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1110.120"}]}],"versions":["4.4.0-1004.9","4.4.0-1007.12","4.4.0-1008.13","4.4.0-1009.14","4.4.0-1010.15","4.4.0-1012.17","4.4.0-1013.18","4.4.0-1015.20","4.4.0-1017.22","4.4.0-1019.24","4.4.0-1020.25","4.4.0-1021.26","4.4.0-1023.28","4.4.0-1026.31","4.4.0-1027.32","4.4.0-1029.34","4.4.0-1031.37","4.4.0-1032.38","4.4.0-1033.39","4.4.0-1035.41","4.4.0-1036.42","4.4.0-1037.43","4.4.0-1038.44","4.4.0-1039.45","4.4.0-1040.46","4.4.0-1041.47","4.4.0-1043.49","4.4.0-1044.50","4.4.0-1046.52","4.4.0-1047.53","4.4.0-1048.55","4.4.0-1051.58","4.4.0-1052.59","4.4.0-1054.61","4.4.0-1056.63","4.4.0-1058.65","4.4.0-1059.66","4.4.0-1060.67","4.4.0-1062.69","4.4.0-1063.70","4.4.0-1064.71","4.4.0-1065.72","4.4.0-1066.73","4.4.0-1068.75","4.4.0-1069.76","4.4.0-1070.77","4.4.0-1071.78","4.4.0-1075.82","4.4.0-1076.83","4.4.0-1077.84","4.4.0-1078.85","4.4.0-1079.86","4.4.0-1080.87","4.4.0-1082.91","4.4.0-1084.93","4.4.0-1085.94","4.4.0-1087.96","4.4.0-1088.97","4.4.0-1089.98","4.4.0-1090.99","4.4.0-1091.100","4.4.0-1092.101","4.4.0-1093.102","4.4.0-1094.103","4.4.0-1095.104","4.4.0-1096.105","4.4.0-1097.106","4.4.0-1098.107","4.4.0-1099.108","4.4.0-1100.109","4.4.0-1102.111","4.4.0-1103.112","4.4.0-1104.113","4.4.0-1105.114","4.4.0-1108.118"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"linux-buildinfo-4.4.0-1110-kvm","binary_version":"4.4.0-1110.120"},{"binary_name":"linux-cloud-tools-4.4.0-1110-kvm","binary_version":"4.4.0-1110.120"},{"binary_name":"linux-headers-4.4.0-1110-kvm","binary_version":"4.4.0-1110.120"},{"binary_name":"linux-image-4.4.0-1110-kvm","binary_version":"4.4.0-1110.120"},{"binary_name":"linux-kvm-cloud-tools-4.4.0-1110","binary_version":"4.4.0-1110.120"},{"binary_name":"linux-kvm-headers-4.4.0-1110","binary_version":"4.4.0-1110.120"},{"binary_name":"linux-kvm-tools-4.4.0-1110","binary_version":"4.4.0-1110.120"},{"binary_name":"linux-modules-4.4.0-1110-kvm","binary_version":"4.4.0-1110.120"},{"binary_name":"linux-tools-4.4.0-1110-kvm","binary_version":"4.4.0-1110.120"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5505-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3609"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3752"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3760"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-4197"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-4202"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-39685"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-39714"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-0330"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1353"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1419"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1652"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1679"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1734"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21123"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21125"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21166"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-24958"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-28356"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-28388"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}}],"schema_version":"1.7.3"}